summaryrefslogtreecommitdiff
path: root/test
Commit message (Collapse)AuthorAgeFilesLines
...
| * | Add ssh agent lock and unlockKlaus Stein2019-11-171-0/+2
| | |
* | | Merge pull request #770 from fwininger/rubocopMiklós Fazekas2020-06-1016-16/+16
|\ \ \ | | | | | | | | Some coding style improvement
| * | | Fix Style/DefWithParenthesesFlorian Wininger2020-05-291-1/+1
| | | | | | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
| * | | Fix Layout/TrailingBlankLinesFlorian Wininger2020-05-2915-15/+15
| | |/ | |/| | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* | | Rubocop fixMiklos Fazekas2020-06-101-1/+1
| | |
* | | Fix testsMiklos Fazekas2020-06-101-7/+7
| | |
* | | Rubocop fixesMiklos Fazekas2020-06-101-1/+1
| | |
* | | Implemented rsa-sha2-512, rsa-sha2-256 host_key algsMiklos Fazekas2020-06-104-6/+22
| | |
* | | Try to fix CIfix-cdn-for-ciMiklós Fazekas2020-05-291-1/+1
|/ / | | | | Use https://cloudflare.cdn.openbsd.org/ instead of cdn.openbsd.org for download stability
* | Let use Etc.getpwuid.name() instead of Etc.getlogin to adapt default ↵Itsuki Noda2020-05-011-1/+1
| | | | | | | | | | | | behavior of ssh. related issue: #749.
* | Revert "Make hmac-sha2-{256,512}-etm opt-in"revert-757-opt-in-etm-hmacMiklós Fazekas2020-04-251-9/+9
| |
* | Fixed test_algMiklos Fazekas2020-04-251-2/+2
| |
* | Add test to reproduce corrupted Mac issueMiklos Fazekas2020-04-253-3/+129
| |
* | Merge pull request #751 from maxfierke/mf-support_algo_subtractionMiklós Fazekas2020-04-241-1/+38
|\ \ | | | | | | Support algorithm subtraction syntax from ssh_config
| * | Support algorithm subtraction syntax from ssh_configMax Fierke2020-04-141-1/+38
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As per `man ssh_config` for KexAlgorithms, MACs, and similar options: ``` Multiple algorithms must be comma-separated. Alternately if the specified value begins with a '+' character, then the specified methods will be appended to the default set instead of replacing them. If the specified value begins with a '-' character, then the specified methods (including wildcards) will be removed from the default set instead of replacing them. ``` Without this, having these subtraction options in your SSH config will replace the default algorithms and cause Net::SSH to raise with `Net::SSH::Exception` and "could not settle on host_key algorithm". i.e. it uses `-ssh-rsa` as the algorithm, rather than removing `ssh-rsa` from the algorithm preferences.
* | | Make hmac-md5-96 hmac-sha2-512-etm@openssh.com hmac-sha2-256-etm@openssh.com ↵Miklos Fazekas2020-04-241-7/+7
| | | | | | | | | | | | opt in instead of default because of the currpoted hmac issue
* | | Added new basic hmac integration test for etmMiklos Fazekas2020-04-203-2/+65
|/ /
* | Add integration test for set_env optionMingxiang Xue2020-03-114-19/+40
| | | | | | | | Signed-off-by: Mingxiang Xue <mingxiangxue@gmail.com>
* | Fix rubocop stylesMingxiang Xue2020-03-091-2/+2
| | | | | | | | Signed-off-by: Mingxiang Xue <mingxiangxue@gmail.com>
* | Add set_env optionMingxiang Xue2020-03-093-0/+17
| | | | | | | | Signed-off-by: Mingxiang Xue <mingxiangxue@gmail.com>
* | (GH-737) Allow known_hosts to have empty lines and commentsdonoghuc2020-02-152-0/+7
| | | | | | | | Previously empty lines in a known_hosts file would result in an exception parsing the file. This commit updates the parser to allow empty lines as well as comments. Note that comments were already supported.
* | Fix tests as wellAlexander Pyatkin2020-02-111-1/+1
| |
* | Merge pull request #736 from sawanoboly/issue_731Miklós Fazekas2020-02-061-0/+32
|\ \ | | | | | | allow multiple newlines for OPENSSH PRIVATE KEY
| * | allow multiple newlines for OPENSSH PRIVATE KEYsawanoboly2020-01-231-0/+32
| | |
* | | Use latest mocha and fix incompatMiklós Fazekas2020-02-061-7/+7
|/ /
* | Fix rubocop complaintsAnders Carling2019-10-311-1/+1
| |
* | Test signing using explicitly loaded keycertAnders Carling2019-10-311-0/+8
| |
* | Test CertificateFile configuration loadingAnders Carling2019-10-312-1/+6
| |
* | Test handling of keycert listAnders Carling2019-10-311-0/+14
| |
* | Test matching of explicitly configured key certificates to private keysAnders Carling2019-10-311-0/+55
| |
* | Separate public and private keys in testAnders Carling2019-10-311-40/+60
| | | | | | Required to test matching of explicitly configured key certificates to private keys
* | Improve test by providing a real Certificate instance instead of repurposing ↵Anders Carling2019-10-311-6/+24
| | | | | | | | the privat key
* | Test explicit cert configurationAnders Carling2019-10-311-6/+35
| |
* | Add integration test using cert and key from ssh-agentAnders Carling2019-10-311-0/+17
| |
* | Fix signing with private key file existing both on disk and in agent, ↵Anders Carling2019-10-311-8/+8
|/ | | | without corresponding public key on disk
* Merge pull request #713 from mfazekas/int-test-curve25519sha256Miklós Fazekas2019-10-253-1/+91
|\ | | | | Integration test for Curve25519Sha256Keys
| * Fixed fragile waitpidMiklos Fazekas2019-10-251-1/+6
| |
| * Integration test for Curve25519Sha256Keysint-test-curve25519sha256Miklos Fazekas2019-09-162-0/+85
| |
* | Original (brbrady) Add support for all algorithms in ↵Brandon Weaver2019-10-251-4/+14
| | | | | | | | Transport::Algorithms#host_key_format
* | Define rubocop metric lengthFlorian Wininger2019-09-253-5/+0
| | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* | Merge pull request #710 from fwininger/enhancementMiklós Fazekas2019-09-216-67/+55
|\ \ | | | | | | Enhance unit-test and remove unused file archfour_check.rb
| * | Enhance unit-test and remove unused file archfour_check.rbFlorian Wininger2019-09-116-67/+55
| | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* | | Add sha2-{256,512}-etm@openssh.com MAC algorithmsHans de Graaff2019-09-176-7/+221
| |/ |/| | | | | | | | | | | | | | | | | | | | | | | | | | | Implement the Encrypt-Then-Mac versions of the SHA2-256 and SHA2-512 MACs. These MACs are implemented by openssh and may be the only MACs available on a hardened installation of openssh. With EtM the MAC is calculated over the unencrypted packet length and the encrypted payload (which includes padding length and padding). The main benefit of EtM schemes is that it allows the encrypted payload to be authenticated before it gets passed to the encryption engine. This patch does not implement that mechanism, but this can be added later to the poll_next_packet method. Note that all current MACs already pass unauthenticated data to the encryption engine.
* | Add Curve25519Sha256Florian Wininger2019-09-102-5/+169
|/ | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Disable by default unsecure algorithmFlorian Wininger2019-09-021-27/+37
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Rubocop : fix parenthesesFlorian Wininger2019-08-236-14/+14
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Refactoring style unlesselse.Florian Wininger2019-08-231-8/+3
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Rubocop solve : Layout/IndentationWidthFlorian Wininger2019-08-231-6/+6
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Fix Layout/IndentHeredocFlorian Wininger2019-08-236-196/+196
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Fix Layout/IndentAssignmentFlorian Wininger2019-08-234-4/+4
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>